SlideShare una empresa de Scribd logo
1 de 13
1
AMITY UNIVERSITYAMITY UNIVERSITY
NAME:-Ankit Ranjan
B.TECH-IT(1ST
YEAR)
A2305313048
TOPIC:-”CYBER SECURITY”
ABSTRACT
. Cyber Security restricted to describing the criminal activity
in which the Computer or network is a part of Crime like
fraud, theft & black mail
. Cyber Security includes Protection from theft, corruption or
natural disaster while allowing the information & property
remain accessible
. Cyber Security helps to understand the cyber Security
Strategy, science of Cyber Security, Cyber Ecosystem
.Cyber Security deals with Securing the future-”SECURING
FOR TOMORROW’S WORLD”
• The explosive growth, complexity, adoption and
dynamism of cyber space that have enhanced
social interaction & expanded our ability
• Cyber Security is an issue to be broad, there are
too many devices being connected to the internet
that have variable security
• The world wide security technology & service
market is forecast to reach 67.2 billion in 2013, up
8.7 percent from 61.8 billion in 2012 according to
Gartner
INTRODUCTION
• Protect the information & services from
unintended & unauthorized access
• Allowing the information & property to
remain accessible & productive to it’s
intended user
• Protect from unplanned events & natural
disaster
• Anticipate the techniques targets of known,
new & emerging sophisticated threats
OBJECTIVE
• Growth of Cyber Security is very strongly
demanded from industry & government for
trained professionals, facing a skill gap
• In an interconnected world reliant upon
smartphones, social media, e-commerce &
cloud services, information security impacts
more & more on public
• Cyber Security is more significantly
expanded with more domains to secure &
more ways to attack
UNDERSTANDING THE NEED & TRENDS
• Cyber Security education covers new area like
Cyber physical attack, the protection of
heterogeneous system & real time security data
analysis
• The existing programs covers the traditional
security ( cryptography ) & emerging technical
area( cloud & mobile security )
• Designing & managing security for networks,
software,hardware,data & applications is crucial
SCIENCE OF CYBER SECURITY
• Critical cyber system must trust, inspire &
confidence, predictably protect integrity of
data owners, & perform securely,&
reliably
• Security science should have broad
applicability, transcending specific system
• Cyber Security issues is relegated on
increasing openness & collaboration,
along with immediate priorities
7
INTER-RELATED CYBER ECOSYSTEM
• Automation helps to incorporate
decisions & action taken in response to
cyber events
• Interoperability defined as policies &
allows for seamless & dynamic
collaboration
• Authentication provides assurance that
participants are authentic or genuine
8
CYBER SECURITY POLICIES
• Cyber Security act of 2010 seek to
increase collaboration between public &
private sector of cyber security issues
• International cyber crime reporting &
cooperation act directs the president to
give priority for assistance to improve
legal, judicial, & enforcement capabilities
with respect to cyber crime to countries
with low information technology
9
• Protecting Cyberspace as a national
assets act of 2010 would grant the
president emergency powers over the
internet
• National Cyber Defenses initiatives of
Berlin is to detect & prevent attack
against the national infrastructure
10
COMPUTER PROTECTION
• Hardware security solutions can prevent
the read & write access to data
• Secure operating system protect the
application code from malicious
subversion
• Secure coding protect to execute putative
data & the attacker couldn’t control of the
processors
11
• Security Analyst
• Security Engineer
• Security Architect
• Security Administrator
• Chief Information Security Officer
12
CYBER SECURITY JOB MARKET
Thanks

Más contenido relacionado

La actualidad más candente

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
kelsports
 

La actualidad más candente (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Destacado

Destacado (20)

Importance of sports in our life by Shreyansh Gupta
Importance of sports in our life by Shreyansh GuptaImportance of sports in our life by Shreyansh Gupta
Importance of sports in our life by Shreyansh Gupta
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Snapshot of digital india
Snapshot of digital indiaSnapshot of digital india
Snapshot of digital india
 
impact of information technology on environment
impact of information technology on environmentimpact of information technology on environment
impact of information technology on environment
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Введение в реверс-инжиниринг вредоносного ПО - Сергей Харюк
Введение в реверс-инжиниринг вредоносного ПО - Сергей ХарюкВведение в реверс-инжиниринг вредоносного ПО - Сергей Харюк
Введение в реверс-инжиниринг вредоносного ПО - Сергей Харюк
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
 
Big data abstract
Big data abstractBig data abstract
Big data abstract
 
Big data Abstract
Big data AbstractBig data Abstract
Big data Abstract
 
Abstract
AbstractAbstract
Abstract
 
Abstract
AbstractAbstract
Abstract
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Fog computing
Fog computingFog computing
Fog computing
 

Similar a Cyber Security

ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
S .Ali Raza
 

Similar a Cyber Security (20)

Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Fog computing
Fog computingFog computing
Fog computing
 
Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position Paper
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Now
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 

Último

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Último (20)

NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 

Cyber Security

  • 1. 1 AMITY UNIVERSITYAMITY UNIVERSITY NAME:-Ankit Ranjan B.TECH-IT(1ST YEAR) A2305313048 TOPIC:-”CYBER SECURITY”
  • 2. ABSTRACT . Cyber Security restricted to describing the criminal activity in which the Computer or network is a part of Crime like fraud, theft & black mail . Cyber Security includes Protection from theft, corruption or natural disaster while allowing the information & property remain accessible . Cyber Security helps to understand the cyber Security Strategy, science of Cyber Security, Cyber Ecosystem .Cyber Security deals with Securing the future-”SECURING FOR TOMORROW’S WORLD”
  • 3. • The explosive growth, complexity, adoption and dynamism of cyber space that have enhanced social interaction & expanded our ability • Cyber Security is an issue to be broad, there are too many devices being connected to the internet that have variable security • The world wide security technology & service market is forecast to reach 67.2 billion in 2013, up 8.7 percent from 61.8 billion in 2012 according to Gartner INTRODUCTION
  • 4. • Protect the information & services from unintended & unauthorized access • Allowing the information & property to remain accessible & productive to it’s intended user • Protect from unplanned events & natural disaster • Anticipate the techniques targets of known, new & emerging sophisticated threats OBJECTIVE
  • 5. • Growth of Cyber Security is very strongly demanded from industry & government for trained professionals, facing a skill gap • In an interconnected world reliant upon smartphones, social media, e-commerce & cloud services, information security impacts more & more on public • Cyber Security is more significantly expanded with more domains to secure & more ways to attack UNDERSTANDING THE NEED & TRENDS
  • 6. • Cyber Security education covers new area like Cyber physical attack, the protection of heterogeneous system & real time security data analysis • The existing programs covers the traditional security ( cryptography ) & emerging technical area( cloud & mobile security ) • Designing & managing security for networks, software,hardware,data & applications is crucial
  • 7. SCIENCE OF CYBER SECURITY • Critical cyber system must trust, inspire & confidence, predictably protect integrity of data owners, & perform securely,& reliably • Security science should have broad applicability, transcending specific system • Cyber Security issues is relegated on increasing openness & collaboration, along with immediate priorities 7
  • 8. INTER-RELATED CYBER ECOSYSTEM • Automation helps to incorporate decisions & action taken in response to cyber events • Interoperability defined as policies & allows for seamless & dynamic collaboration • Authentication provides assurance that participants are authentic or genuine 8
  • 9. CYBER SECURITY POLICIES • Cyber Security act of 2010 seek to increase collaboration between public & private sector of cyber security issues • International cyber crime reporting & cooperation act directs the president to give priority for assistance to improve legal, judicial, & enforcement capabilities with respect to cyber crime to countries with low information technology 9
  • 10. • Protecting Cyberspace as a national assets act of 2010 would grant the president emergency powers over the internet • National Cyber Defenses initiatives of Berlin is to detect & prevent attack against the national infrastructure 10
  • 11. COMPUTER PROTECTION • Hardware security solutions can prevent the read & write access to data • Secure operating system protect the application code from malicious subversion • Secure coding protect to execute putative data & the attacker couldn’t control of the processors 11
  • 12. • Security Analyst • Security Engineer • Security Architect • Security Administrator • Chief Information Security Officer 12 CYBER SECURITY JOB MARKET

Notas del editor

  1. As you have done the TERM PAPER after the first year, it is an individual understanding and work under the offline supervision of faculty mentor. The purpose of the term paper is know something about the research, how do write the research paper etc.
  2. It is the first team work which you students will do under the direct supervision and guidance of the faculty mentor(s). Consider it is the first technical project so implement your knowledge.